In the post-SOX compliance era, companies and government agencies risk financial liability and brand damage from privacy law violations and data breaches. Consumers, patients, scientists, soldiers, and students need and demand confidentiality. The data at risk includes:

Personally Identifiable Information (PII)

Used alone or with other data to identify, contact, or locate someone. Examples include name, address, phone number, and national ID number. Government regulations like SSAE16 SOC2 and the GDPR, which takes effects 25 May 2018, require that all PII is protected.

Information like codes and formulas that constitute trade or military secrets needs to be protected. You cannot afford to have this critical data lost in a data breach.

Both national data privacy laws and internal regulations mandate the protection of this data. Compliance is not only required ... it must also be verifiable.

What's Your Approach?

Are you using a home-grown solution, and is it robust and easy to maintain? Is your encryption solution protecting everything ham-handedly with a single point of failure? Or do you use a data masking tool that only covers one data source or offers too few functions?

Is data masking tightly integrated into your data management lifecycle and infrastructure? Can you mask data while manipulating or reporting on it, easily modify those jobs, and automatically log them to prove compliance?

All of IRI's "startpoint security" products include cost-effective PII discovery, classification, de-identification, and auditing. They leverage the same, free Eclipse GUI to connect and apply a wide array of targeted, field-level protection functions to a multiple data sources. Learn more about how you can do things like:

Each IRI data masking solution also produces audit logs that you can secure and query to document and verify compliance with data privacy laws.

If you need safe test data, masking production data is one way to go. But in Voracity, you can also subset and mask database tables, or use its built-in IRI RowGen functions to generate safe, referentially correct test data for multiple targets from scratch!

Perform data masking standalone, or directly within BI, DB, ETL and other applications.

[1]Use IRI FieldShield as a standalone product, or within the IRI Voracity platform for data discovery, integration, migration, governance, and analytics. FieldShield data and job definitions also share the same metadata syntax and Eclipse GUI with other Voracity component products (IRI CoSort, IRI NextForm, and IRI RowGen) to further facilitate integration of data masking operations into the enterprise information management (EIM) lifecycle.